A SERVICE OF

logo

64
G Wireless Router
SECTIONSTable of Contents 1 2 3 4 5 7 8 9 106
USING THE WEB-BASED ADVANCED USER INTERFACE
7. Check the box that says “Enable ONLY specific Access Points
to connect”�
8. In the fields named “AP1”, type in the MAC address of your
secondary Access Point� When you have typed in the address,
click “Apply Changes”�
9. Bridging is now set up�
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
• IP Spoofing
• SYN flood
• Land Attack
• UDP flooding
• Ping of Death (PoD)
• Tear Drop Attack
• Denial of Service (DoS)
• ICMP defect
• IP with zero length
• RIP defect
• Smurf Attack
• Fragment flooding
• TCP Null Scan